instruction string | input string | output string | cwe_ids list | cve_id string | severity string | cvss_score float64 | repo_name string | func_name string | file_path string | commit_hash string | is_vulnerable int64 |
|---|---|---|---|---|---|---|---|---|---|---|---|
Analyze the following code function for security vulnerabilities | @Override
public void registerRemoteAnimationsForDisplay(int displayId,
RemoteAnimationDefinition definition) {
mAmInternal.enforceCallingPermission(CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS,
"registerRemoteAnimations");
definition.setCallingPidUid(Binder.getCallingPid(), ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: registerRemoteAnimationsForDisplay
File: services/core/java/com/android/server/wm/ActivityTaskManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40094 | HIGH | 7.8 | android | registerRemoteAnimationsForDisplay | services/core/java/com/android/server/wm/ActivityTaskManagerService.java | 1120bc7e511710b1b774adf29ba47106292365e7 | 0 |
Analyze the following code function for security vulnerabilities | @Override
MethodHandle cloneWithNewType(MethodType newType) {
return new InterfaceHandle(this, newType);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cloneWithNewType
File: jcl/src/java.base/share/classes/java/lang/invoke/InterfaceHandle.java
Repository: eclipse-openj9/openj9
The code follows secure coding practices. | [
"CWE-440",
"CWE-250"
] | CVE-2021-41035 | HIGH | 7.5 | eclipse-openj9/openj9 | cloneWithNewType | jcl/src/java.base/share/classes/java/lang/invoke/InterfaceHandle.java | c6e0d9296ff9a3084965d83e207403de373c0bad | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String register(String loginName, String password) {
if (mallUserMapper.selectByLoginName(loginName) != null) {
return ServiceResultEnum.SAME_LOGIN_NAME_EXIST.getResult();
}
MallUser registerUser = new MallUser();
registerUser.setLoginName(loginName);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: register
File: src/main/java/ltd/newbee/mall/service/impl/NewBeeMallUserServiceImpl.java
Repository: newbee-ltd/newbee-mall
The code follows secure coding practices. | [
"CWE-639"
] | CVE-2023-30216 | MEDIUM | 5.4 | newbee-ltd/newbee-mall | register | src/main/java/ltd/newbee/mall/service/impl/NewBeeMallUserServiceImpl.java | 4f8948579ddd6843a2e313fdd55aafc809246f63 | 0 |
Analyze the following code function for security vulnerabilities | public void onCancelClicked() {
mSecurityCallback.onCancelClicked();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCancelClicked
File: packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21245 | HIGH | 7.8 | android | onCancelClicked | packages/SystemUI/src/com/android/keyguard/KeyguardSecurityContainerController.java | a33159e8cb297b9eee6fa5c63c0e343d05fad622 | 0 |
Analyze the following code function for security vulnerabilities | static void resetPriorityAfterLockedSection() {
sThreadPriorityBooster.reset();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetPriorityAfterLockedSection
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | resetPriorityAfterLockedSection | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public void setAutocompleteText(CharSequence userText, CharSequence inlineAutocompleteText) {
boolean emptyAutocomplete = TextUtils.isEmpty(inlineAutocompleteText);
if (!emptyAutocomplete) mDisableTextScrollingFromAutocomplete = true;
int autocompleteIndex = userText.length();
String ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setAutocompleteText
File: chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java
Repository: chromium
The code follows secure coding practices. | [
"CWE-254"
] | CVE-2016-5163 | MEDIUM | 4.3 | chromium | setAutocompleteText | chrome/android/java/src/org/chromium/chrome/browser/omnibox/UrlBar.java | 3bd33fee094e863e5496ac24714c558bd58d28ef | 0 |
Analyze the following code function for security vulnerabilities | @Override
public Bitmap getTaskDescriptionIcon(String filePath, int userId) {
userId = mUserController.handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(),
userId, false, ALLOW_FULL_ONLY, "getTaskDescriptionIcon", null);
final File passedIconFile = new File(filePath);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getTaskDescriptionIcon
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | getTaskDescriptionIcon | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public void setReuseParser(final boolean reuseParser) {
this.reuseParser = reuseParser;
if (!reuseParser) {
engine = null;
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setReuseParser
File: core/src/java/org/jdom2/input/SAXBuilder.java
Repository: hunterhacker/jdom
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-33813 | MEDIUM | 5 | hunterhacker/jdom | setReuseParser | core/src/java/org/jdom2/input/SAXBuilder.java | bd3ab78370098491911d7fe9d7a43b97144a234e | 0 |
Analyze the following code function for security vulnerabilities | private String exportPropertiesPart(Map < String, Property<?>> mapOfProperties) {
// Create <features>
StringBuilder sb = new StringBuilder(BEGIN_PROPERTIES);
if (mapOfProperties != null && !mapOfProperties.isEmpty()) {
sb.append(buildPropertiesPart(mapOfProperties));
}
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: exportPropertiesPart
File: ff4j-core/src/main/java/org/ff4j/conf/XmlParser.java
Repository: ff4j
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2022-44262 | CRITICAL | 9.8 | ff4j | exportPropertiesPart | ff4j-core/src/main/java/org/ff4j/conf/XmlParser.java | 991df72725f78adbc413d9b0fbb676201f1882e0 | 0 |
Analyze the following code function for security vulnerabilities | User getUser() {
return user;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getUser
File: core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-200"
] | CVE-2014-2064 | MEDIUM | 5 | jenkinsci/jenkins | getUser | core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java | fbf96734470caba9364f04e0b77b0bae7293a1ec | 0 |
Analyze the following code function for security vulnerabilities | @Override
boolean showToCurrentUser() {
return mShowForAllUsers || mWmService.isCurrentProfile(mUserId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: showToCurrentUser
File: services/core/java/com/android/server/wm/ActivityRecord.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21145 | HIGH | 7.8 | android | showToCurrentUser | services/core/java/com/android/server/wm/ActivityRecord.java | 44aeef1b82ecf21187d4903c9e3666a118bdeaf3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean injectCustomMapping(BaseClass doc1class) throws XWikiException
{
if (!doc1class.hasExternalCustomMapping()) {
return false;
}
if (!isCustomMappingValid(doc1class, doc1class.getCustomMapping())) {
throw new XWikiException(XWikiException.MO... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: injectCustomMapping
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | injectCustomMapping | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onFragmentViewCreated(String tag, Fragment fragment) {
mQs = (QS) fragment;
mQs.setPanelView(NotificationPanelView.this);
mQs.setExpandClickListener(NotificationPanelView.this);
mQs.setHeaderClickable(mQsExpansionEnabled);
mQs.set... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onFragmentViewCreated
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | onFragmentViewCreated | packages/SystemUI/src/com/android/systemui/statusbar/phone/NotificationPanelView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | @SuppressWarnings("checkstyle:MethodLength")
public String generate(Config config) {
isNotNull(config, "Config");
StringBuilder xml = new StringBuilder();
XmlGenerator gen = new XmlGenerator(xml);
PersistenceAndHotRestartPersistenceMerger.merge(config.getHotRestartPersistenceConfig... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: generate
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-522"
] | CVE-2023-33264 | MEDIUM | 4.3 | hazelcast | generate | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | 80a502d53cc48bf895711ab55f95e3a51e344ac1 | 0 |
Analyze the following code function for security vulnerabilities | @SystemApi
@RequiresPermission(anyOf = {
Manifest.permission.ADJUST_RUNTIME_PERMISSIONS_POLICY,
Manifest.permission.UPGRADE_RUNTIME_PERMISSIONS
})
public @IntRange(from = 0) int getRuntimePermissionsVersion() {
try {
return mPackageManager.getRuntimePermissionsVer... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRuntimePermissionsVersion
File: core/java/android/permission/PermissionManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-281"
] | CVE-2023-21249 | MEDIUM | 5.5 | android | getRuntimePermissionsVersion | core/java/android/permission/PermissionManager.java | c00b7e7dbc1fa30339adef693d02a51254755d7f | 0 |
Analyze the following code function for security vulnerabilities | @GET
@Path("/extensions")
@Produces(MediaType.APPLICATION_JSON)
public List<String> getSupportedExtensions(@Context SecurityContext securityContext) {
if (!securityContext.isUserInRole(Authentication.ROLE_FILESYSTEM_EDITOR)) {
throw new ForbiddenException("FILESYSTEM EDITOR role is requi... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSupportedExtensions
File: opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestService.java
Repository: OpenNMS/opennms
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40315 | HIGH | 8 | OpenNMS/opennms | getSupportedExtensions | opennms-webapp-rest/src/main/java/org/opennms/web/rest/v1/FilesystemRestService.java | 201301e067329ababa3c0671ded5c4c43347d4a8 | 0 |
Analyze the following code function for security vulnerabilities | public abstract void resetFailedAttempts(); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: resetFailedAttempts
File: services/core/java/com/android/server/fingerprint/AuthenticationClient.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | resetFailedAttempts | services/core/java/com/android/server/fingerprint/AuthenticationClient.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | public BaseClass getRightsClass(XWikiContext context) throws XWikiException
{
return getRightsClass("XWikiRights", context);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRightsClass
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getRightsClass | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onActivityResult(int requestCode, int resultcode, Intent data) {
super.onActivityResult(requestCode, resultcode, data);
if (requestCode != 1) return;
if (resultcode == RESULT_OK) {
handleAuthenticated();
} else {
Log.w(TAG, "Authentication failed");
failure = t... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onActivityResult
File: app/src/main/java/org/thoughtcrime/securesms/PassphrasePromptActivity.java
Repository: oxen-io/session-android
The code follows secure coding practices. | [
"CWE-287"
] | CVE-2022-1955 | LOW | 2.1 | oxen-io/session-android | onActivityResult | app/src/main/java/org/thoughtcrime/securesms/PassphrasePromptActivity.java | c69b49e676dd8f619418cf296d6fdad9ce5a9510 | 0 |
Analyze the following code function for security vulnerabilities | public void setDozing(boolean dozing, boolean animate) {
mDozing = dozing;
updateCameraVisibility();
updateLeftAffordanceIcon();
if (dozing) {
mLockIcon.setVisibility(INVISIBLE);
} else {
mLockIcon.setVisibility(VISIBLE);
if (animate) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDozing
File: packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2017-0822 | HIGH | 7.5 | android | setDozing | packages/SystemUI/src/com/android/systemui/statusbar/phone/KeyguardBottomAreaView.java | c574568aaede7f652432deb7707f20ae54bbdf9a | 0 |
Analyze the following code function for security vulnerabilities | protected int toVisibility(boolean visibleOrGone) {
return visibleOrGone ? View.VISIBLE : View.GONE;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toVisibility
File: src/com/android/settings/password/ChooseLockPassword.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40117 | HIGH | 7.8 | android | toVisibility | src/com/android/settings/password/ChooseLockPassword.java | 11815817de2f2d70fe842b108356a1bc75d44ffb | 0 |
Analyze the following code function for security vulnerabilities | public void setHierarchyMode(String mode)
{
setPropertyInXWikiPreferences("core.hierarchyMode", "String", mode);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setHierarchyMode
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | setHierarchyMode | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setNearbyAppStreamingPolicy(int policy) {
if (!mHasFeature) {
return;
}
final CallerIdentity caller = getCallerIdentity();
Preconditions.checkCallAuthorization(
isDefaultDeviceOwner(caller) || isProfileOwner(caller));
synchr... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setNearbyAppStreamingPolicy
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setNearbyAppStreamingPolicy | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public int getMaxSessionCookieSize() {
return maxSessionCookieSize;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMaxSessionCookieSize
File: ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java
Repository: ratpack
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2021-29481 | MEDIUM | 5 | ratpack | getMaxSessionCookieSize | ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java | 60302fae7ef26897b9a0ec0def6281a9425344cf | 0 |
Analyze the following code function for security vulnerabilities | @SuppressLint("ClickableViewAccessibility")
@Override
public void onCreate(Bundle savedInstanceState) {
Log.d(TAG, "onCreate");
super.onCreate(savedInstanceState);
NextcloudTalkApplication.Companion.getSharedApplication().getComponentApplication().inject(this);
binding = CallAc... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onCreate
File: app/src/main/java/com/nextcloud/talk/activities/CallActivity.java
Repository: nextcloud/talk-android
The code follows secure coding practices. | [
"CWE-732",
"CWE-200"
] | CVE-2022-41926 | MEDIUM | 5.5 | nextcloud/talk-android | onCreate | app/src/main/java/com/nextcloud/talk/activities/CallActivity.java | bb7e82fbcbd8c10d0d0128d736c41cec0f79e7d0 | 0 |
Analyze the following code function for security vulnerabilities | void onUnlockUser(int userId) {
if (Log.isLoggable(TAG, Log.VERBOSE)) {
Log.v(TAG, "onUserUnlocked " + userId);
}
synchronized (mUsers) {
mLocalUnlockedUsers.put(userId, true);
}
if (userId < 1) return;
mHandler.post(() -> syncSharedAccounts(userId... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onUnlockUser
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | onUnlockUser | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void renderHead(final IHeaderResponse response)
{
super.renderHead(response);
if (lazyBinding == false) {
final String script = getJavaScriptAction();
response.render(OnDomReadyHeaderItem.forScript(script));
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: renderHead
File: src/main/java/org/projectforge/web/dialog/ModalDialog.java
Repository: micromata/projectforge-webapp
The code follows secure coding practices. | [
"CWE-352"
] | CVE-2013-7251 | MEDIUM | 6.8 | micromata/projectforge-webapp | renderHead | src/main/java/org/projectforge/web/dialog/ModalDialog.java | 422de35e3c3141e418a73bfb39b430d5fd74077e | 0 |
Analyze the following code function for security vulnerabilities | private void resumeScreenLock() {
KeyguardManager keyguardManager = (KeyguardManager) getSystemService(Context.KEYGUARD_SERVICE);
assert keyguardManager != null;
if (!keyguardManager.isKeyguardSecure()) {
Log.w(TAG ,"Keyguard not secure...");
TextSecurePreferences.setScreenLockEnabled(getAppli... | Vulnerability Classification:
- CWE: CWE-287
- CVE: CVE-2022-1955
- Severity: LOW
- CVSS Score: 2.1
Description: feat: handle KeyStore backed fingerprint verification
Function: resumeScreenLock
File: app/src/main/java/org/thoughtcrime/securesms/PassphrasePromptActivity.java
Repository: oxen-io/session-android
Fixed ... | [
"CWE-287"
] | CVE-2022-1955 | LOW | 2.1 | oxen-io/session-android | resumeScreenLock | app/src/main/java/org/thoughtcrime/securesms/PassphrasePromptActivity.java | c69b49e676dd8f619418cf296d6fdad9ce5a9510 | 1 |
Analyze the following code function for security vulnerabilities | public static Locale getCurrentLocale() {
Locale locale=null;
StaplerRequest req = Stapler.getCurrentRequest();
if(req!=null)
locale = req.getLocale();
if(locale==null)
locale = Locale.getDefault();
return locale;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCurrentLocale
File: core/src/main/java/hudson/Functions.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-310"
] | CVE-2014-2061 | MEDIUM | 5 | jenkinsci/jenkins | getCurrentLocale | core/src/main/java/hudson/Functions.java | bf539198564a1108b7b71a973bf7de963a6213ef | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public List<String> getVirtualWikiList()
{
return new ArrayList<>(this.initializedWikis.keySet());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getVirtualWikiList
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2021-32620 | MEDIUM | 4 | xwiki/xwiki-platform | getVirtualWikiList | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/XWiki.java | f9a677408ffb06f309be46ef9d8df1915d9099a4 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String getCookieValue(String name) {
HttpCookie cookie = request.getCookies().getFirst(name);
if(cookie == null) {
return null;
}
return cookie.getValue();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCookieValue
File: sa-token-starter/sa-token-reactor-spring-boot-starter/src/main/java/cn/dev33/satoken/reactor/model/SaRequestForReactor.java
Repository: dromara/Sa-Token
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-44794 | CRITICAL | 9.8 | dromara/Sa-Token | getCookieValue | sa-token-starter/sa-token-reactor-spring-boot-starter/src/main/java/cn/dev33/satoken/reactor/model/SaRequestForReactor.java | 954efeb73277f924f836da2a25322ea35ee1bfa3 | 0 |
Analyze the following code function for security vulnerabilities | public static boolean hasDirectBufferNoCleanerConstructor() {
return PlatformDependent0.hasDirectBufferNoCleanerConstructor();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasDirectBufferNoCleanerConstructor
File: common/src/main/java/io/netty/util/internal/PlatformDependent.java
Repository: netty
The code follows secure coding practices. | [
"CWE-668",
"CWE-378",
"CWE-379"
] | CVE-2022-24823 | LOW | 1.9 | netty | hasDirectBufferNoCleanerConstructor | common/src/main/java/io/netty/util/internal/PlatformDependent.java | 185f8b2756a36aaa4f973f1a2a025e7d981823f1 | 0 |
Analyze the following code function for security vulnerabilities | public void setSort(Integer sort) {
this.sort = sort;
} | Vulnerability Classification:
- CWE: CWE-79
- CVE: CVE-2023-7171
- Severity: LOW
- CVSS Score: 3.3
Description: fix(novel-admin): 友情链接URL格式校验
Function: setSort
File: novel-admin/src/main/java/com/java2nb/novel/domain/FriendLinkDO.java
Repository: 201206030/novel-plus
Fixed Code:
public void setSort(Integer sort) {
... | [
"CWE-79"
] | CVE-2023-7171 | LOW | 3.3 | 201206030/novel-plus | setSort | novel-admin/src/main/java/com/java2nb/novel/domain/FriendLinkDO.java | d6093d8182362422370d7eaf6c53afde9ee45215 | 1 |
Analyze the following code function for security vulnerabilities | private Map<String, List<File>> getAllDirectories(List<String> states) {
Map<String, List<File>> allDirectories = new HashMap<>();
if ( shouldIncludeState(states, Recording.STATE_PUBLISHED) ) {
List<File> listedDirectories = getAllDirectories(Recording.STATE_PUBLISHED);
allDirec... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAllDirectories
File: bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java
Repository: bigbluebutton
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-12443 | HIGH | 7.5 | bigbluebutton | getAllDirectories | bbb-common-web/src/main/java/org/bigbluebutton/api/RecordingService.java | b21ca8355a57286a1e6df96984b3a4c57679a463 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public WearableExtender setContentIconGravity(int contentIconGravity) {
mContentIconGravity = contentIconGravity;
return this;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setContentIconGravity
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setContentIconGravity | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | private void enforceCanQueryLockTaskLocked(ComponentName who, String callerPackageName) {
CallerIdentity caller = getCallerIdentity(who, callerPackageName);
final int userId = caller.getUserId();
enforceCanQuery(MANAGE_DEVICE_POLICY_LOCK_TASK, caller.getPackageName(), userId);
if ((isDe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: enforceCanQueryLockTaskLocked
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | enforceCanQueryLockTaskLocked | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public ResumeMediaBrowser create(ResumeMediaBrowser.Callback callback,
ComponentName componentName) {
return new ResumeMediaBrowser(mContext, callback, componentName, mBrowserFactory, mLogger);
} | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2023-35675
- Severity: MEDIUM
- CVSS Score: 5.5
Description: Improve user handling when querying for resumable media
- Before trying to query recent media from a saved component, check
whether the current user actually has that component installed
- Track us... | [
"CWE-Other"
] | CVE-2023-35675 | MEDIUM | 5.5 | android | create | packages/SystemUI/src/com/android/systemui/media/ResumeMediaBrowserFactory.java | c1cf4b9746c9641190730172522324ccd5b8c914 | 1 |
Analyze the following code function for security vulnerabilities | @Override
public List<PhoneAccountHandle> getCallCapablePhoneAccounts(
boolean includeDisabledAccounts, String callingPackage) {
if (!canReadPhoneState(callingPackage, "getDefaultOutgoingPhoneAccount")) {
return Collections.emptyList();
}
sync... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCallCapablePhoneAccounts
File: src/com/android/server/telecom/TelecomServiceImpl.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0847 | HIGH | 7.2 | android | getCallCapablePhoneAccounts | src/com/android/server/telecom/TelecomServiceImpl.java | 2750faaa1ec819eed9acffea7bd3daf867fda444 | 0 |
Analyze the following code function for security vulnerabilities | int getCurrentTtyMode() {
return mTtyManager.getCurrentTtyMode();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getCurrentTtyMode
File: src/com/android/server/telecom/CallsManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-2423 | MEDIUM | 6.6 | android | getCurrentTtyMode | src/com/android/server/telecom/CallsManager.java | a06c9a4aef69ae27b951523cf72bf72412bf48fa | 0 |
Analyze the following code function for security vulnerabilities | private static String saveFormFile (String formInode, String formType,
String fileName, File fileToSave, Host currentHost, String filesFolder) throws Exception {
FileAPI fileAPI=APILocator.getFileAPI();
String path;
if(filesFolder != null)
path = filesFolder;
else
path = getFormFileFolderPath(formType... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: saveFormFile
File: src/com/dotmarketing/factories/EmailFactory.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4040 | MEDIUM | 6.5 | dotCMS/core | saveFormFile | src/com/dotmarketing/factories/EmailFactory.java | bc4db5d71dc67015572f8e4c6fdf87e29b854d02 | 0 |
Analyze the following code function for security vulnerabilities | public void buildSyncCreate(IssuesWithBLOBs issue, String platformId, Integer nextNum) {
issue.setProjectId(projectId);
issue.setId(UUID.randomUUID().toString());
issue.setPlatformId(platformId);
issue.setCreator(SessionUtils.getUserId());
issue.setNum(nextNum);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: buildSyncCreate
File: test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java
Repository: metersphere
The code follows secure coding practices. | [
"CWE-918"
] | CVE-2022-23544 | MEDIUM | 6.1 | metersphere | buildSyncCreate | test-track/backend/src/main/java/io/metersphere/service/issue/platform/AbstractIssuePlatform.java | d0f95b50737c941b29d507a4cc3545f2dc6ab121 | 0 |
Analyze the following code function for security vulnerabilities | public Object getSelectedRow() throws IllegalStateException {
if (selectionModel instanceof SelectionModel.Single) {
return ((SelectionModel.Single) selectionModel).getSelectedRow();
} else if (selectionModel instanceof SelectionModel.Multi) {
throw new IllegalStateException("Can... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getSelectedRow
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getSelectedRow | server/src/main/java/com/vaadin/ui/Grid.java | b9ba10adaa06a0977c531f878c3f0046b67f9cc0 | 0 |
Analyze the following code function for security vulnerabilities | public FormValidation doCheckDisplayName(@QueryParameter String displayName,
@QueryParameter String jobName) {
displayName = displayName.trim();
if(LOGGER.isLoggable(Level.FINE)) {
LOGGER.log(Level.FINE, "Current job name is " + jobName);
}
if(!... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: doCheckDisplayName
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | doCheckDisplayName | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Analyze the following code function for security vulnerabilities | public void dispatchScreenTurnedOn() {
synchronized (this) {
mScreenOn = true;
}
mHandler.sendEmptyMessage(MSG_SCREEN_TURNED_ON);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dispatchScreenTurnedOn
File: packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3917 | HIGH | 7.2 | android | dispatchScreenTurnedOn | packages/Keyguard/src/com/android/keyguard/KeyguardUpdateMonitor.java | f5334952131afa835dd3f08601fb3bced7b781cd | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onConfigurationChanged(Configuration newConfig) {
super.onConfigurationChanged(newConfig);
final boolean newTwoPaneState = mSplitController.isActivityEmbedded(this);
if (mIsTwoPane != newTwoPaneState) {
mIsTwoPane = newTwoPaneState;
updateHomepag... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onConfigurationChanged
File: src/com/android/settings/homepage/SettingsHomepageActivity.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21256 | HIGH | 7.8 | android | onConfigurationChanged | src/com/android/settings/homepage/SettingsHomepageActivity.java | 62fc1d269f5e754fc8f00b6167d79c3933b4c1f4 | 0 |
Analyze the following code function for security vulnerabilities | private void startUninstallIntent(final String packageName, final int userId) {
final UserPackage packageUserPair = UserPackage.of(userId, packageName);
synchronized (getLockObject()) {
if (!mPackagesToRemove.contains(packageUserPair)) {
// Do nothing if uninstall was not req... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: startUninstallIntent
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | startUninstallIntent | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | static boolean canBeImeTarget(WindowState w) {
final int fl = w.mAttrs.flags
& (FLAG_NOT_FOCUSABLE|FLAG_ALT_FOCUSABLE_IM);
if (fl == 0 || fl == (FLAG_NOT_FOCUSABLE|FLAG_ALT_FOCUSABLE_IM)
|| w.mAttrs.type == TYPE_APPLICATION_STARTING) {
if (DEBUG_INPUT_METHOD) ... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: canBeImeTarget
File: services/core/java/com/android/server/wm/WindowManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3875 | HIGH | 7.2 | android | canBeImeTarget | services/core/java/com/android/server/wm/WindowManagerService.java | 69729fa8b13cadbf3173fe1f389fe4f3b7bd0f9c | 0 |
Analyze the following code function for security vulnerabilities | void handleLocaleChanged() {
if (DEBUG) {
Slog.d(TAG, "handleLocaleChanged");
}
scheduleSaveBaseState();
synchronized (mLock) {
final long token = injectClearCallingIdentity();
try {
forEachLoadedUserLocked(user -> user.detectLocaleCha... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleLocaleChanged
File: services/core/java/com/android/server/pm/ShortcutService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-40079 | HIGH | 7.8 | android | handleLocaleChanged | services/core/java/com/android/server/pm/ShortcutService.java | 96e0524c48c6e58af7d15a2caf35082186fc8de2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public List<PotentialDuplicate> getAllByQuery( PotentialDuplicateQuery query )
{
String queryString = "from PotentialDuplicate pr where pr.status in (:status)";
return Optional.ofNullable( query.getTeis() ).filter( teis -> !teis.isEmpty() ).map( teis -> {
Query<PotentialDu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getAllByQuery
File: dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/deduplication/hibernate/HibernatePotentialDuplicateStore.java
Repository: dhis2/dhis2-core
The code follows secure coding practice... | [
"CWE-89"
] | CVE-2022-24848 | MEDIUM | 6.5 | dhis2/dhis2-core | getAllByQuery | dhis-2/dhis-services/dhis-service-core/src/main/java/org/hisp/dhis/deduplication/hibernate/HibernatePotentialDuplicateStore.java | ef04483a9b177d62e48dcf4e498b302a11f95e7d | 0 |
Analyze the following code function for security vulnerabilities | final void scheduleAppGcsLocked() {
mHandler.removeMessages(GC_BACKGROUND_PROCESSES_MSG);
if (mProcessesToGc.size() > 0) {
// Schedule a GC for the time to the next process.
ProcessRecord proc = mProcessesToGc.get(0);
Message msg = mHandler.obtainMessage(GC_BACKGROUN... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: scheduleAppGcsLocked
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2018-9492 | HIGH | 7.2 | android | scheduleAppGcsLocked | services/core/java/com/android/server/am/ActivityManagerService.java | 962fb40991f15be4f688d960aa00073683ebdd20 | 0 |
Analyze the following code function for security vulnerabilities | public String nextTo(char d) {
StringBuilder sb = new StringBuilder();
for (;;) {
char c = next();
if (c == d || c == 0 || c == '\n' || c == '\r') {
if (c != 0) {
back();
}
return sb.toString().trim();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: nextTo
File: src/main/java/org/codehaus/jettison/json/JSONTokener.java
Repository: jettison-json/jettison
The code follows secure coding practices. | [
"CWE-674",
"CWE-787"
] | CVE-2022-45693 | HIGH | 7.5 | jettison-json/jettison | nextTo | src/main/java/org/codehaus/jettison/json/JSONTokener.java | cf6a4a1f85416b49b16a5b0c5c0bb81a4833dbc8 | 0 |
Analyze the following code function for security vulnerabilities | @TestApi
public void setDeviceOwnerType(@NonNull ComponentName admin,
@DeviceOwnerType int deviceOwnerType) {
throwIfParentInstance("setDeviceOwnerType");
if (mService != null) {
try {
mService.setDeviceOwnerType(admin, deviceOwnerType);
} catch (R... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setDeviceOwnerType
File: core/java/android/app/admin/DevicePolicyManager.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | setDeviceOwnerType | core/java/android/app/admin/DevicePolicyManager.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean hasRunningForegroundService(int uid, int foregroundServicetype) {
synchronized (ActivityManagerService.this) {
return mProcessList.searchEachLruProcessesLOSP(true, app -> {
if (app.uid != uid) {
return null;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: hasRunningForegroundService
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | hasRunningForegroundService | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean areMutableImagesFast() {
if (myView == null) return false;
return !myView.alwaysRepaintAll();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: areMutableImagesFast
File: Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java
Repository: codenameone/CodenameOne
The code follows secure coding practices. | [
"CWE-668"
] | CVE-2022-4903 | MEDIUM | 5.1 | codenameone/CodenameOne | areMutableImagesFast | Ports/Android/src/com/codename1/impl/android/AndroidImplementation.java | dad49c9ef26a598619fc48d2697151a02987d478 | 0 |
Analyze the following code function for security vulnerabilities | protected abstract void process(CiphertextHeader header, boolean mode, InputStream input, OutputStream output); | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: process
File: src/main/java/org/cryptacular/bean/AbstractCipherBean.java
Repository: vt-middleware/cryptacular
The code follows secure coding practices. | [
"CWE-770"
] | CVE-2020-7226 | MEDIUM | 5 | vt-middleware/cryptacular | process | src/main/java/org/cryptacular/bean/AbstractCipherBean.java | 8c6c7528f1e24c6b71f3e36db0cb8a697256ce25 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public boolean dumpHeap(String process, int userId, boolean managed, boolean mallocInfo,
boolean runGc, String path, ParcelFileDescriptor fd, RemoteCallback finishCallback) {
try {
// note: hijacking SET_ACTIVITY_WATCHER, but should be changed to
// its own perm... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: dumpHeap
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | dumpHeap | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | void addCrossProfileIntentFilter(DefaultCrossProfileIntentFilter filter, int parentUserId,
int profileUserId)
throws RemoteException {
if (filter.direction == DefaultCrossProfileIntentFilter.Direction.TO_PROFILE) {
mIPackageManager.addCrossProfileIntentFilter(
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: addCrossProfileIntentFilter
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | addCrossProfileIntentFilter | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setSyncAdapterPackagesprovider(SyncAdapterPackagesProvider provider) {
synchronized (mPackages) {
mDefaultPermissionPolicy.setSyncAdapterPackagesProviderLPw(provider);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setSyncAdapterPackagesprovider
File: services/core/java/com/android/server/pm/PackageManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-119"
] | CVE-2016-2497 | HIGH | 7.5 | android | setSyncAdapterPackagesprovider | services/core/java/com/android/server/pm/PackageManagerService.java | a75537b496e9df71c74c1d045ba5569631a16298 | 0 |
Analyze the following code function for security vulnerabilities | public URLStreamHandler createURLStreamHandler() {
return Optional.ofNullable(urlStreamHandlerClassName)
.map(Util::createInstanceOrNull)
.map(urlStreamHandlerFactory -> ((URLStreamHandlerFactory) urlStreamHandlerFactory).createURLStreamHandler(this.name()))
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createURLStreamHandler
File: core/src/main/java/apoc/util/FileUtils.java
Repository: neo4j-contrib/neo4j-apoc-procedures
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-23532 | MEDIUM | 6.5 | neo4j-contrib/neo4j-apoc-procedures | createURLStreamHandler | core/src/main/java/apoc/util/FileUtils.java | 01e63ed2d187cd2a8aa1d78bf831ef0fdd69b522 | 0 |
Analyze the following code function for security vulnerabilities | public void moveTaskToFront(int task, int flags, Bundle options) throws RemoteException
{
Parcel data = Parcel.obtain();
Parcel reply = Parcel.obtain();
data.writeInterfaceToken(IActivityManager.descriptor);
data.writeInt(task);
data.writeInt(flags);
if (options != nu... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: moveTaskToFront
File: core/java/android/app/ActivityManagerNative.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-3832 | HIGH | 8.3 | android | moveTaskToFront | core/java/android/app/ActivityManagerNative.java | e7cf91a198de995c7440b3b64352effd2e309906 | 0 |
Analyze the following code function for security vulnerabilities | @NonNull
public Builder setPublicVersion(Notification n) {
if (n != null) {
mN.publicVersion = new Notification();
n.cloneInto(mN.publicVersion, /*heavy=*/ true);
} else {
mN.publicVersion = null;
}
return this;
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setPublicVersion
File: core/java/android/app/Notification.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-21288 | MEDIUM | 5.5 | android | setPublicVersion | core/java/android/app/Notification.java | 726247f4f53e8cc0746175265652fa415a123c0c | 0 |
Analyze the following code function for security vulnerabilities | @Override // since 2.12
public LogicalType logicalType() {
return LogicalType.Untyped;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: logicalType
File: src/main/java/com/fasterxml/jackson/databind/deser/std/UntypedObjectDeserializer.java
Repository: FasterXML/jackson-databind
The code follows secure coding practices. | [
"CWE-787"
] | CVE-2020-36518 | MEDIUM | 5 | FasterXML/jackson-databind | logicalType | src/main/java/com/fasterxml/jackson/databind/deser/std/UntypedObjectDeserializer.java | 8238ab41d0350fb915797c89d46777b4496b74fd | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected void processFile(GFile file, File destFSFile, TaskMonitor monitor)
throws IOException, CancelledException {
if (!shouldSkip(file)) {
super.processFile(file, destFSFile, monitor);
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: processFile
File: Ghidra/Features/Base/src/main/java/ghidra/app/plugin/core/archive/RestoreTask.java
Repository: NationalSecurityAgency/ghidra
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2019-13623 | MEDIUM | 6.8 | NationalSecurityAgency/ghidra | processFile | Ghidra/Features/Base/src/main/java/ghidra/app/plugin/core/archive/RestoreTask.java | c15364e0a4bd2bcd3bdf13a35afd6ac9607a5164 | 0 |
Analyze the following code function for security vulnerabilities | public ViewPage createPageWithAttachment(String space, String page, String content, String title,
String attachmentName, InputStream attachmentData) throws Exception
{
return createPageWithAttachment(space, page, content, title, null, null, attachmentName, attachmentData);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createPageWithAttachment
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2023-35166 | HIGH | 8.8 | xwiki/xwiki-platform | createPageWithAttachment | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263 | 0 |
Analyze the following code function for security vulnerabilities | boolean isFrontStack(ActivityStack stack) {
if (stack == null) {
return false;
}
final ActivityRecord parent = stack.mActivityContainer.mParentActivity;
if (parent != null) {
stack = parent.task.stack;
}
return stack == mFocusedStack;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: isFrontStack
File: services/core/java/com/android/server/am/ActivityStackSupervisor.java
Repository: android
The code follows secure coding practices. | [
"CWE-284"
] | CVE-2016-3838 | MEDIUM | 4.3 | android | isFrontStack | services/core/java/com/android/server/am/ActivityStackSupervisor.java | 468651c86a8adb7aa56c708d2348e99022088af3 | 0 |
Analyze the following code function for security vulnerabilities | @Override
protected List<Contentlet> findAllCurrent() throws DotDataException {
throw new DotDataException("findAllCurrent() will blow your stack off, use findAllCurrent(offset, limit)");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: findAllCurrent
File: src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-2355 | HIGH | 7.5 | dotCMS/core | findAllCurrent | src/com/dotcms/content/elasticsearch/business/ESContentFactoryImpl.java | 897f3632d7e471b7a73aabed5b19f6f53d4e5562 | 0 |
Analyze the following code function for security vulnerabilities | private static final void handleIOException(String msg, Exception e) {
try {
String className = e.getClass().getSimpleName();
if("ClientAbortException".equals(className)) {
log.debug("client browser probably abort during operaation", e);
} else {
log.error(msg, e);
}
} catch (Exception e1) {
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: handleIOException
File: src/main/java/org/olat/core/util/ZipUtil.java
Repository: OpenOLAT
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2021-39180 | HIGH | 9 | OpenOLAT | handleIOException | src/main/java/org/olat/core/util/ZipUtil.java | 5668a41ab3f1753102a89757be013487544279d5 | 0 |
Analyze the following code function for security vulnerabilities | public int parseWidth(String widthDecimal) {
String w = "";
widthDecimal = widthDecimal.trim();
if (widthDecimal.startsWith("(")) {
} else if (widthDecimal.contains("(")) {
w = widthDecimal.split("\\(")[0];
} else {
w = widthDecimal;
}
if (... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: parseWidth
File: core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java
Repository: OpenClinica
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-24831 | HIGH | 7.5 | OpenClinica | parseWidth | core/src/main/java/org/akaza/openclinica/dao/extract/OdmExtractDAO.java | b152cc63019230c9973965a98e4386ea5322c18f | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public String getRealLanguage() throws XWikiException
{
return this.doc.getRealLanguage(getXWikiContext());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getRealLanguage
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-863"
] | CVE-2022-23615 | MEDIUM | 5.5 | xwiki/xwiki-platform | getRealLanguage | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/api/Document.java | 7ab0fe7b96809c7a3881454147598d46a1c9bbbe | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void abort(String callId, Session.Info info) throws RemoteException { } | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: abort
File: tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21283 | MEDIUM | 5.5 | android | abort | tests/src/com/android/server/telecom/tests/ConnectionServiceFixture.java | 9b41a963f352fdb3da1da8c633d45280badfcb24 | 0 |
Analyze the following code function for security vulnerabilities | private static String getFormFileFolderPath (String formType, String formInode) {
String path = Config.getStringProperty("SAVED_UPLOAD_FILES_PATH")
+ "/" + formType.replace(" ", "_") + "/"
+ String.valueOf(formInode).substring(0, 1) + "/" + formInode;
return path;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getFormFileFolderPath
File: src/com/dotmarketing/factories/EmailFactory.java
Repository: dotCMS/core
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2016-4040 | MEDIUM | 6.5 | dotCMS/core | getFormFileFolderPath | src/com/dotmarketing/factories/EmailFactory.java | bc4db5d71dc67015572f8e4c6fdf87e29b854d02 | 0 |
Analyze the following code function for security vulnerabilities | public void updateNString(@Positive int columnIndex, @Nullable String nString) throws SQLException {
throw org.postgresql.Driver.notImplemented(this.getClass(), "updateNString(int, String)");
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateNString
File: pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java
Repository: pgjdbc
The code follows secure coding practices. | [
"CWE-89"
] | CVE-2022-31197 | HIGH | 8 | pgjdbc | updateNString | pgjdbc/src/main/java/org/postgresql/jdbc/PgResultSet.java | 739e599d52ad80f8dcd6efedc6157859b1a9d637 | 0 |
Analyze the following code function for security vulnerabilities | @Override
@SuppressWarnings("unchecked")
public Jooby map(final Mapper<?> mapper) {
requireNonNull(mapper, "Mapper is required.");
if (mappers.add(mapper.name())) {
this.mapper = Optional.ofNullable(this.mapper)
.map(next -> Route.Mapper.chain(mapper, next))
.orElse((Mapper<Object>... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: map
File: jooby/src/main/java/org/jooby/Jooby.java
Repository: jooby-project/jooby
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2020-7647 | MEDIUM | 5 | jooby-project/jooby | map | jooby/src/main/java/org/jooby/Jooby.java | 34f526028e6cd0652125baa33936ffb6a8a4a009 | 0 |
Analyze the following code function for security vulnerabilities | @Deprecated
public void loadXWikiCollection(BaseCollection object, XWikiContext context, boolean bTransaction)
throws XWikiException
{
loadXWikiCollectionInternal(object, context, bTransaction, false);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: loadXWikiCollection
File: xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-459"
] | CVE-2023-36468 | HIGH | 8.8 | xwiki/xwiki-platform | loadXWikiCollection | xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/store/XWikiHibernateStore.java | 15a6f845d8206b0ae97f37aa092ca43d4f9d6e59 | 0 |
Analyze the following code function for security vulnerabilities | public static ActivityOptions makeClipRevealAnimation(View source,
int startX, int startY, int width, int height) {
ActivityOptions opts = new ActivityOptions();
opts.mAnimationType = ANIM_CLIP_REVEAL;
int[] pts = new int[2];
source.getLocationOnScreen(pts);
opts.mSta... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: makeClipRevealAnimation
File: core/java/android/app/ActivityOptions.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-20918 | CRITICAL | 9.8 | android | makeClipRevealAnimation | core/java/android/app/ActivityOptions.java | 51051de4eb40bb502db448084a83fd6cbfb7d3cf | 0 |
Analyze the following code function for security vulnerabilities | public void characters(char[] ch, int start, int length) throws SAXException {
if (appendChar) {
content.append(ch, start, length).append(" ");
}
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: characters
File: src/main/java/com/openkm/extractor/OpenOfficeTextExtractor.java
Repository: openkm/document-management-system
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2021-33950 | HIGH | 7.5 | openkm/document-management-system | characters | src/main/java/com/openkm/extractor/OpenOfficeTextExtractor.java | ce1d82329615aea6aa9f2cc6508c1fe7891e34b5 | 0 |
Analyze the following code function for security vulnerabilities | protected B frameLogger(Http2FrameLogger frameLogger) {
enforceNonCodecConstraints("frameLogger");
this.frameLogger = checkNotNull(frameLogger, "frameLogger");
return self();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: frameLogger
File: codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java
Repository: netty
The code follows secure coding practices. | [
"CWE-400"
] | CVE-2023-44487 | HIGH | 7.5 | netty | frameLogger | codec-http2/src/main/java/io/netty/handler/codec/http2/AbstractHttp2ConnectionHandlerBuilder.java | 58f75f665aa81a8cbcf6ffa74820042a285c5e61 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onTransferProgress(
long progressRate,
long totalTransferredSoFar,
long totalToTransfer,
String fileName
) {
String key = buildRemoteName(mCurrentUpload.getUser().getAccountName(), mCurrentUpload.getFile().getRemotePath())... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: onTransferProgress
File: app/src/main/java/com/owncloud/android/files/services/FileUploader.java
Repository: nextcloud/android
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-39210 | MEDIUM | 5.5 | nextcloud/android | onTransferProgress | app/src/main/java/com/owncloud/android/files/services/FileUploader.java | cd3bd0845a97e1d43daa0607a122b66b0068c751 | 0 |
Analyze the following code function for security vulnerabilities | public static SvnClientManager createClientManager(AbstractProject context) {
return new SvnClientManager(createSvnClientManager(Hudson.getInstance().getDescriptorByType(DescriptorImpl.class).createAuthenticationProvider(context)));
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: createClientManager
File: src/main/java/hudson/scm/SubversionSCM.java
Repository: jenkinsci/subversion-plugin
The code follows secure coding practices. | [
"CWE-255"
] | CVE-2013-6372 | LOW | 2.1 | jenkinsci/subversion-plugin | createClientManager | src/main/java/hudson/scm/SubversionSCM.java | 7d4562d6f7e40de04bbe29577b51c79f07d05ba6 | 0 |
Analyze the following code function for security vulnerabilities | private Object extractPayload(Object payload, String eventClass) {
try {
final Class<?> clazz = chainingClassLoader.loadClass(eventClass);
return objectMapper.convertValue(payload, clazz);
} catch (ClassNotFoundException e) {
LOG.debug("Couldn't load class <" + eventC... | Vulnerability Classification:
- CWE: CWE-863
- CVE: CVE-2024-24824
- Severity: HIGH
- CVSS Score: 8.8
Description: Restrict classes allowed for cluster config and event types (#18165) (#18179)
* Restrict classes allowed for cluster config and event types (#18165)
Add a new safe_classes configuration option to rest... | [
"CWE-863"
] | CVE-2024-24824 | HIGH | 8.8 | Graylog2/graylog2-server | extractPayload | graylog2-server/src/main/java/org/graylog2/events/ClusterEventPeriodical.java | 75ef2b8d60e7d67f859b79fe712c8ae7b2e861d8 | 1 |
Analyze the following code function for security vulnerabilities | public static String prettyPrintXML(final String xml) {
final Reader reader = new StringReader(xml);
final Writer writer = new StringWriter(1000);
prettyPrintXML(reader, writer);
return writer.toString();
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: prettyPrintXML
File: stroom-core-server/src/main/java/stroom/entity/server/util/XMLUtil.java
Repository: gchq/stroom
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-1000651 | HIGH | 7.5 | gchq/stroom | prettyPrintXML | stroom-core-server/src/main/java/stroom/entity/server/util/XMLUtil.java | ba30ffd415bd7d32ee40ba4b04035267ce80b499 | 0 |
Analyze the following code function for security vulnerabilities | @Test
public void testDeserializationAsFloatEdgeCase10() throws Exception
{
String input = "1e-10000000";
Instant value = MAPPER.readValue(input, Instant.class);
assertEquals(0, value.getEpochSecond());
} | Vulnerability Classification:
- CWE: CWE-20
- CVE: CVE-2018-1000873
- Severity: MEDIUM
- CVSS Score: 4.3
Description: Avoid latency problems converting decimal to time.
Fixes https://github.com/FasterXML/jackson-databind/issues/2141
Function: testDeserializationAsFloatEdgeCase10
File: datetime/src/test/java/com/fast... | [
"CWE-20"
] | CVE-2018-1000873 | MEDIUM | 4.3 | FasterXML/jackson-modules-java8 | testDeserializationAsFloatEdgeCase10 | datetime/src/test/java/com/fasterxml/jackson/datatype/jsr310/TestInstantSerialization.java | ba27ce5909dfb49bcaf753ad3e04ecb980010b0b | 1 |
Analyze the following code function for security vulnerabilities | private void cleanUpOldUsers() {
// This is needed in case the broadcast {@link Intent.ACTION_USER_REMOVED} was not handled
// before reboot
Set<Integer> usersWithProfileOwners;
Set<Integer> usersWithData;
synchronized (getLockObject()) {
usersWithProfileOwners = mOwn... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cleanUpOldUsers
File: services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-862"
] | CVE-2023-40089 | HIGH | 7.8 | android | cleanUpOldUsers | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | e2e05f488da6abc765a62e7faf10cb74e729732e | 0 |
Analyze the following code function for security vulnerabilities | public List<CmsContent> recycle(short siteId, Serializable[] ids) {
List<CmsContent> entityList = new ArrayList<>();
for (CmsContent entity : getEntitys(ids)) {
if (siteId == entity.getSiteId() && entity.isDisabled()) {
entity.setDisabled(false);
entityList.ad... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: recycle
File: publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/service/cms/CmsContentService.java
Repository: sanluan/PublicCMS
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2020-21333 | LOW | 3.5 | sanluan/PublicCMS | recycle | publiccms-parent/publiccms-core/src/main/java/com/publiccms/logic/service/cms/CmsContentService.java | b4d5956e65b14347b162424abb197a180229b3db | 0 |
Analyze the following code function for security vulnerabilities | public void updateSystemUiContext() {
final PackageManagerInternal packageManagerInternal = getPackageManagerInternal();
ApplicationInfo ai = packageManagerInternal.getApplicationInfo("android",
GET_SHARED_LIBRARY_FILES, Binder.getCallingUid(), UserHandle.USER_SYSTEM);
ActivityT... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: updateSystemUiContext
File: services/core/java/com/android/server/am/ActivityManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other"
] | CVE-2023-21292 | MEDIUM | 5.5 | android | updateSystemUiContext | services/core/java/com/android/server/am/ActivityManagerService.java | d10b27e539f7bc91c2360d429b9d05f05274670d | 0 |
Analyze the following code function for security vulnerabilities | public static RecentsTaskLoadPlan consumeInstanceLoadPlan() {
RecentsTaskLoadPlan plan = sInstanceLoadPlan;
sInstanceLoadPlan = null;
return plan;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: consumeInstanceLoadPlan
File: packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2016-0813 | MEDIUM | 6.6 | android | consumeInstanceLoadPlan | packages/SystemUI/src/com/android/systemui/recents/AlternateRecentsComponent.java | 16a76dadcc23a13223e9c2216dad1fe5cad7d6e1 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public MergeTarget newMergeTargetForField(
Descriptors.FieldDescriptor field, Message defaultInstance) {
Message.Builder subBuilder;
if (defaultInstance != null) {
subBuilder = defaultInstance.newBuilderForType();
} else {
subBuilder = builder.newBuilderForField(f... | Vulnerability Classification:
- CWE: CWE-Other
- CVE: CVE-2022-3509
- Severity: HIGH
- CVSS Score: 7.5
Description: Clean up TextFormat parser (#10673)
* Fix TextFormat parser
Function: newMergeTargetForField
File: java/core/src/main/java/com/google/protobuf/MessageReflection.java
Repository: protocolbuffers/protobu... | [
"CWE-Other"
] | CVE-2022-3509 | HIGH | 7.5 | protocolbuffers/protobuf | newMergeTargetForField | java/core/src/main/java/com/google/protobuf/MessageReflection.java | a3888f53317a8018e7a439bac4abeb8f3425d5e9 | 1 |
Analyze the following code function for security vulnerabilities | private static MetadataMappingResolver getMetadaMappingResolver(){
return Context.getRegisteredComponent("metadataMappingResolver", MetadataMappingResolver.class);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getMetadaMappingResolver
File: api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java
Repository: openmrs/openmrs-module-htmlformentry
The code follows secure coding practices. | [
"CWE-611"
] | CVE-2018-16521 | HIGH | 7.5 | openmrs/openmrs-module-htmlformentry | getMetadaMappingResolver | api/src/main/java/org/openmrs/module/htmlformentry/HtmlFormEntryUtil.java | 9dcd304688e65c31cac5532fe501b9816ed975ae | 0 |
Analyze the following code function for security vulnerabilities | private boolean entityForbidden(AnnotatedElement entity,
HttpServletRequest request) {
return entity.isAnnotationPresent(DenyAll.class) || (!entity
.isAnnotationPresent(AnonymousAllowed.class)
&& !roleAllowed(entity.getAnnotation(RolesAllowed.class),
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: entityForbidden
File: fusion-endpoint/src/main/java/com/vaadin/flow/server/connect/auth/VaadinConnectAccessChecker.java
Repository: vaadin/flow
The code follows secure coding practices. | [
"CWE-203"
] | CVE-2021-31406 | LOW | 1.9 | vaadin/flow | entityForbidden | fusion-endpoint/src/main/java/com/vaadin/flow/server/connect/auth/VaadinConnectAccessChecker.java | 3fe644cab2cffa5b86316dbe71b11df1083861a9 | 0 |
Analyze the following code function for security vulnerabilities | private AuthenticationInfo authenticate( IdProviderKey idProvider )
{
AuthenticationInfo authInfo = null;
if ( isValidEmail( this.user ) )
{
if ( this.skipAuth )
{
final VerifiedEmailAuthToken verifiedEmailAuthToken = new VerifiedEmailAuthToken();
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: authenticate
File: modules/lib/lib-auth/src/main/java/com/enonic/xp/lib/auth/LoginHandler.java
Repository: enonic/xp
The code follows secure coding practices. | [
"CWE-384"
] | CVE-2024-23679 | CRITICAL | 9.8 | enonic/xp | authenticate | modules/lib/lib-auth/src/main/java/com/enonic/xp/lib/auth/LoginHandler.java | 0189975691e9e6407a9fee87006f730e84f734ff | 0 |
Analyze the following code function for security vulnerabilities | private void preventPositionRollover() {
//if the position counter is about to roll over we iterate all the table entries
//and set their position to their actual position
for (Map.Entry<HttpString, List<TableEntry>> entry : dynamicTable.entrySet()) {
for (TableEntry t : entry.getVal... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: preventPositionRollover
File: core/src/main/java/io/undertow/protocols/http2/HpackEncoder.java
Repository: undertow-io/undertow
The code follows secure coding practices. | [
"CWE-214"
] | CVE-2021-3859 | HIGH | 7.5 | undertow-io/undertow | preventPositionRollover | core/src/main/java/io/undertow/protocols/http2/HpackEncoder.java | e43f0ada3f4da6e8579e0020cec3cb1a81e487c2 | 0 |
Analyze the following code function for security vulnerabilities | public static void openBrowser(String url) {
lastUrl = url;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: openBrowser
File: h2/src/test/org/h2/test/server/TestWeb.java
Repository: h2database
The code follows secure coding practices. | [
"CWE-312"
] | CVE-2022-45868 | HIGH | 7.8 | h2database | openBrowser | h2/src/test/org/h2/test/server/TestWeb.java | 23ee3d0b973923c135fa01356c8eaed40b895393 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void setUseWorkflowSendEmail(boolean useWorkflowSendEmail) {
this.useWorkflowSendEmail = useWorkflowSendEmail;
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: setUseWorkflowSendEmail
File: dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java
Repository: DSpace
The code follows secure coding practices. | [
"CWE-22"
] | CVE-2022-31195 | HIGH | 7.2 | DSpace | setUseWorkflowSendEmail | dspace-api/src/main/java/org/dspace/app/itemimport/ItemImportServiceImpl.java | 7af52a0883a9dbc475cf3001f04ed11b24c8a4c0 | 0 |
Analyze the following code function for security vulnerabilities | private void cancelAccountAccessRequestNotificationIfNeeded(Account account, int uid,
boolean checkAccess) {
String[] packageNames = mPackageManager.getPackagesForUid(uid);
if (packageNames != null) {
for (String packageName : packageNames) {
cancelAccountAccessRe... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: cancelAccountAccessRequestNotificationIfNeeded
File: services/core/java/com/android/server/accounts/AccountManagerService.java
Repository: android
The code follows secure coding practices. | [
"CWE-Other",
"CWE-502"
] | CVE-2023-45777 | HIGH | 7.8 | android | cancelAccountAccessRequestNotificationIfNeeded | services/core/java/com/android/server/accounts/AccountManagerService.java | f810d81839af38ee121c446105ca67cb12992fc6 | 0 |
Analyze the following code function for security vulnerabilities | private static void checkAndFillCacheLoaderConfigXml(XmlGenerator gen, String cacheLoader) {
if (isNullOrEmpty(cacheLoader)) {
return;
}
gen.node("cache-loader", null, "class-name", cacheLoader);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: checkAndFillCacheLoaderConfigXml
File: hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java
Repository: hazelcast
The code follows secure coding practices. | [
"CWE-502"
] | CVE-2016-10750 | MEDIUM | 6.8 | hazelcast | checkAndFillCacheLoaderConfigXml | hazelcast/src/main/java/com/hazelcast/config/ConfigXmlGenerator.java | c1c31359a1df953e79a9ca9b6c54b3cdbfef11e9 | 0 |
Analyze the following code function for security vulnerabilities | public Column<T, ?> getColumn(String columnId) {
return columnIds.get(columnId);
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getColumn
File: server/src/main/java/com/vaadin/ui/Grid.java
Repository: vaadin/framework
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2019-25028 | MEDIUM | 4.3 | vaadin/framework | getColumn | server/src/main/java/com/vaadin/ui/Grid.java | c40bed109c3723b38694ed160ea647fef5b28593 | 0 |
Analyze the following code function for security vulnerabilities | public String executeWiki(String wikiContent, Syntax wikiSyntax) throws Exception
{
LocalDocumentReference reference =
new LocalDocumentReference(List.of("Test", "Execute"), UUID.randomUUID().toString());
rest().savePage(reference, wikiContent, wikiSyntax.toIdString(), null, null);
... | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: executeWiki
File: xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java
Repository: xwiki/xwiki-platform
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2023-35157 | MEDIUM | 4.8 | xwiki/xwiki-platform | executeWiki | xwiki-platform-core/xwiki-platform-test/xwiki-platform-test-ui/src/main/java/org/xwiki/test/ui/TestUtils.java | 35e9073ffec567861e0abeea072bd97921a3decf | 0 |
Analyze the following code function for security vulnerabilities | @Override
public String toString() {
return getName() + ": static final long serialVersionUID =" + getSerialVersionUID() + "L;";
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: toString
File: luni/src/main/java/java/io/ObjectStreamClass.java
Repository: android
The code follows secure coding practices. | [
"CWE-264"
] | CVE-2014-7911 | HIGH | 7.2 | android | toString | luni/src/main/java/java/io/ObjectStreamClass.java | 738c833d38d41f8f76eb7e77ab39add82b1ae1e2 | 0 |
Analyze the following code function for security vulnerabilities | @Override
public void onCreate(Bundle savedInstanceState) {
if (DeviceUtils.isAuto(this)) {
// Automotive relies on a different theme. Apply before calling super so that
// fragments are restored properly on configuration changes.
setTheme(R.style.CarSettings);
}
... | Vulnerability Classification:
- CWE: CWE-862
- CVE: CVE-2023-21132
- Severity: MEDIUM
- CVSS Score: 6.8
Description: RESTRICT AUTOMERGE Finish ManagePermissionsActivity if device is not provisioned
If the device isn't set up yet, do not allow access to the permissions
settings
Bug: 253043490
Test: manual
(cherry pic... | [
"CWE-862"
] | CVE-2023-21132 | MEDIUM | 6.8 | android | onCreate | PermissionController/src/com/android/permissioncontroller/permission/ui/ManagePermissionsActivity.java | 0679e4f35055729be7276536fe45fe8ec18a0453 | 1 |
Analyze the following code function for security vulnerabilities | public Descriptor<Builder> getBuilder(String shortClassName) {
return findDescriptor(shortClassName, Builder.all());
} | No Vulnerability Detected:
This code is secure and does not contain known vulnerabilities.
Function: getBuilder
File: core/src/main/java/jenkins/model/Jenkins.java
Repository: jenkinsci/jenkins
The code follows secure coding practices. | [
"CWE-79"
] | CVE-2014-2065 | MEDIUM | 4.3 | jenkinsci/jenkins | getBuilder | core/src/main/java/jenkins/model/Jenkins.java | a0b00508eeb74d7033dc4100eb382df4e8fa72e7 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.